Comments (5)
I believe Fulcio did introduce an intermediate certificate, see sigstore/cosign#1774
from sigstore-python.
Weird... I tried with an older certificate I had lying around and I didn't have this problem. So it's something specific to the ones being returned from Fulcio now. I wonder what has changed.
from sigstore-python.
Still unsure about this. The Fulcio signing key doesn't appear to have changed. When I write the chain certificates to the disk, I still have the same problem when I use the openssl
tool directly.
I'm doing:
$ openssl verify -CAfile sigstore/_store/fulcio.crt.pem -untrusted chain0.crt -untrusted chain1.crt test_file.txt.crt
test_file.txt.crt:
error 20 at 0 depth lookup:unable to get local issuer certificate
from sigstore-python.
I believe Fulcio did introduce an intermediate certificate, see sigstore/cosign#1774
Thanks! That looks promising. I'll take a look.
from sigstore-python.
@di Yep, that was the issue. Thanks for that. I'll make a PR now.
from sigstore-python.
Related Issues (20)
- [CI] Integration failure: staging instance HOT 2
- [CI] Integration failure: staging instance HOT 1
- python.org Sigstore documentation doesn't have example for .sigstore bundles HOT 1
- Make `VerificationError` available in the API HOT 5
- Certificate timestamp issue when checking for validity datetime HOT 1
- Allow --verbose flag to be passed in sub-commands HOT 3
- CLI: Provide a subcommand for creating bundles from detached materials? HOT 3
- Rethink our approach to handling old bundle versions
- Error: "Clone succeeded, but checkout failed" HOT 9
- Unclear error message "GCP: OIDC token request failed (code=404)" HOT 2
- pydantic deprecation warnings HOT 4
- Re-enable DCO check as required HOT 1
- Client libraries should verify after signing HOT 1
- make SigningResult._to_bundle() public HOT 1
- Plans for 2.0 release HOT 4
- Produce a pure-Python verification API HOT 6
- Ergonomic way to request certificate/signature files for multiple input files in v2 HOT 5
- Allow users to override the trust root with `--trusted-root` HOT 1
- `--cert-identity` should be optional on `sigstore verify github` HOT 1
- CI: `update-pinned-requirements` is a little too fast
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from sigstore-python.